psicomDigital Insecurity, User Choice, and ResponsibilityAfter presenting one of the amazing scientific reports I post on this here blog, I was presented an interesting question regarding how to…Apr 9, 2018Apr 9, 2018
psicomWhat does an Eevee sound like?For a blogger that uses a small and adored Pokemon for their avatar, Eevee has a rather scathing voice with which complaints about all that…Mar 23, 2018Mar 23, 2018
psicomSecurity and the Optimist MindsetAfter a recent review of the OPM hack that I casually did for a totally optional assignment, it jumped out to me that the director’s and…Mar 2, 2018Mar 2, 2018
psicomDeterrence Philosophy, Nukes, and GunsA common joke question that is asked is “What is the dumbest place to try to hold up with a gun?”. A number of comical answers come to…Feb 23, 2018Feb 23, 2018
psicomThe Flawed Assumption with Internal Armed SecurityWhen people think of what armed security looks like, it ranges from everything between Mall Cop to a well-dressed, tall figure with…Feb 16, 2018Feb 16, 2018
psicomDRM, Video Games, and the Concept of OwnershipDRM or Digital Rights Management is the means by which a company can protect it’s digital product by locking or modifying the product…Feb 10, 2018Feb 10, 2018
psicomShoplifting and Loss PreventionThis is what extreme loss prevention looks like.Feb 2, 2018Feb 2, 2018
psicomCybersecurity vs Traditional SecurityCybersecurity compared to traditional security obviously faces a number of unique challenges that are often not respected by “the man” (ie…Feb 2, 2018Feb 2, 2018
psicominArtful SCreamingHi there. Settle in and worry about everything.Hello, I’m some 20 something Asian boy that absorbs too much random information and needlessly obsesses over what is wrong with the world…Feb 2, 2018Feb 2, 2018